Smarter Gov Tech, Stronger MerITocracy

The United States Transportation Command (USTRANSCOM) is working to improve cybersecurity infrastructures to prevent breaches of industry partners, like those of USTRANSCOM contractors that began June 1, 2012 and resulted in 20 successful intrusions over a period of 12 months by Chinese hackers. […]

threat

A survey released today by IT management software firm SolarWinds finds that Federal IT professionals view unintentional insider threat as the most significant source of security threats. […]

cloud computing concept -min

During her keynote address at Monday’s Center for Strategic and International Studies event, Rep. Suzan DelBene, D-Wash., urged the U.S. government to increase its global engagement when it comes to tech–saying that was the only way to maintain U.S. technological leadership. With that in mind, DelBene offered a series of steps Congress can take to maintain U.S. global leadership. […]

General Services Administration GSA

Not unlike Michael Jordan in the 1997 NBA Finals–battling illness and requiring cold medicine–General Services Administration (GSA) CIO David Shive today spoke about how implementing artificial intelligence (AI) technologies has reduced costs for GSA, and how the agency has made efforts to better engage with start-ups. […]

Information systems trade group ISACA released results of a survey today that finds 70 percent of cybersecurity managers and practitioners believe that their organizations’ cybersecurity teams are understaffed. […]

elections, voting, election security, midterms

The Congressional Budget Office (CBO), in a report released Friday, pegged the cost of H.R. 1–the For the People Act of 2019–at $2.6 billion over the next five years, with $1.5 billion of that going for states and counties to purchase new voting technology. […]

federal workers workforce IT workers employees millennial -min
capitol washington dc senate house congress-min
Cybersecurity flag

Lawmakers from both sides of the aisle and both houses of Congress joined together on Thursday to reintroduce the Help Americans Never Get Unwanted Phone calls, or HANGUP Act. […]

quantum computing chip ai -min

Officials from the intelligence community on Thursday discussed the importance of using artificial intelligence to process and analyze the large amount of collected data by agencies, thus freeing analysts to shift their efforts toward looking into anomalies identified by AI. […]

5G Broadband rural broadband FCC-min
Machine learning AI-min

IT security technology provider Webroot said in a recently issued threat report document that the United States in 2018 led the rest of the world by a wide margin in hosting what the firm classifies as “high-risk URLs.” […]

Credit rating agency Moody’s said in a report issued today that it considers banks, securities firms, financial market infrastructure, and hospitals at “high risk,” from a ratings perspective, due to their exposure to the impacts of cyberattacks. […]

Cybersecurity flag

The White House’s new National Strategy for Aviation Security calls attention to a rising concern in aviation safety: the potential for cyberattacks on aircraft, a prospect that might just be as scary as it sounds. […]

Pentagon Military Defense DoD

Senior Defense Department officials told House members on Tuesday they are taking additional steps to boost cybersecurity workforce ranks at the Pentagon through means including the Cyber Excepted Service (CES) personnel system authorized in 2016 that allows DoD to expedite and simplify recruiting and hiring for civilian cyber professionals. […]

DOJ Department of Justice
DoD Pentagon Military

As the first chief data officer of the Department of Defense (DoD), Michael Conlin described the challenges of approaching a vast mountain of data from numerous systems at the Pentagon, and making it actionable information for the department. […]

elections, voting, election security, midterms

While much of the country was focused today on the testimony of Michael Cohen–President Trump’s former lawyer–before the House Committee on Oversight and Reform, elsewhere on the Hill the House Committee on Appropriations Financial Services and General Government Subcommittee was hearing testimony on election security. […]

cloud computing concept -min
Phone mobile security protection

With growing interest in cloud, mobility, and zero-trust technology, industry leaders in the identity credential access and management (ICAM) space are seeing a divergence between the existing policy of Common Access Card (CAC) and personal identity verification (PIV) cards, and new technology. […]

Most private and public sector CIOs have, are, or will be increasing their spending on cybersecurity and automation software deployments, according to a survey released today by Grant Thornton and the TBM Council. […]

capitol washington dc senate house congress-min

Privacy was the topic du jour on the Hill today. In its first hearing in the new Congress, the House Committee on Energy and Commerce Subcommittee on Consumer Protection and Commerce heard testimony from privacy rights activists and technology industry groups on how to protect consumer privacy in the era of big data. All witnesses before the Subcommittee agreed that the Federal government needs to enact Federal data privacy legislation, though witnesses disagreed on what exactly the legislation should cover. […]

Computers cloud connected-min

The move by government organizations to public cloud infrastructure is often motivated by a desire to provide better services to citizens, but an academic piece warns about the need to maintain public access to open data in the cloud. […]

Palo Alto Networks’ Unit 42 researchers announced on Friday that they have identified a spear phishing campaign from November 2018 that is targeting U.S. national security think tanks and academic institutions. Research indicates that the “threat actor might have interests in gathering intelligence related to not only North Korea, but possibly wider in the Northeast Asia region.” […]

hybrid cloud multi cloud computing in the cloud

As Federal technology managers increasingly operate in a hybrid, multi-cloud world, having a holistic view of their agency’s application landscape and architecture will help in mapping the right workload to the right type of cloud deployment. […]

Categories